US20060267762A1 - Protection against loss or theft of identification badges and other items - Google Patents
Protection against loss or theft of identification badges and other items Download PDFInfo
- Publication number
- US20060267762A1 US20060267762A1 US11/141,436 US14143605A US2006267762A1 US 20060267762 A1 US20060267762 A1 US 20060267762A1 US 14143605 A US14143605 A US 14143605A US 2006267762 A1 US2006267762 A1 US 2006267762A1
- Authority
- US
- United States
- Prior art keywords
- alert
- user
- electronic apparatus
- identification information
- badge
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0241—Data exchange details, e.g. data protocol
- G08B21/0255—System arrangements wherein the parent unit emits, i.e. the parent unit incorporates the emitter
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0275—Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
Definitions
- This invention relates to protecting against loss or theft of portable items such as identification badges and is especially, but not exclusively, suited to immediately notify an owner if the portable item becomes separated by more than a short distance from another electronic device carried by the owner.
- an authorized user If an authorized user becomes aware that his badge has been lost or stolen, the authorized user can mitigate the security risk by informing appropriate security personnel who can then watch for a person presenting the badge or can invalidate the badge and issue the authorized user a new badge.
- a greater problem is presented when the authorized user is unaware that his badge has been stolen. For example, a thief seeking to steal a person's access badge might wait for an authorized user to enter an environment favorable to a pickpocket attempt such as a crowded train or bus. Then, the pickpocket or a team of pickpockets working together could distract the user and remove the badge from the user's coat pocket, purse or from a pocket of a laptop computer carry bag.
- An exemplary electronic apparatus monitors whether a security badge remains within an area proximate to the electronic apparatus in order to protect against loss or theft of the badge especially when the user is away from the secure environment for which the badge facilitates access.
- a transmitter periodically transmits a poll signal intended for reception by a radio frequency identification (RFID) module attached to the badge, the poll signal having a predetermined magnitude to limit the effective reception range of the poll signal to the proximate area.
- RFID radio frequency identification
- a receiver can receive a reply signal generated by the RFID module in response to receipt of the poll signal where the reply signal includes identification information that is unique to the electronic device.
- the received identification information is compared with first identification information stored in memory of the electronic apparatus to determine if the received identification information matches the first identification information.
- An alert is transmitted if the identification information is not received that matches the first identification information.
- the present invention also contemplates an exemplary method that provides protection of a badge based on maintaining periodic wireless contact between the badge and an electronic apparatus where both the badge and electronic apparatus are carried by the user outside of the secured environment.
- FIG. 1 is a block diagram of an exemplary system in accordance with the present invention
- FIG. 2 is a side view of the exemplary badge of FIG. 1 ;
- FIG. 3 is a flow diagram of steps in an exemplary method in accordance with the present invention.
- One aspect of the present invention resides in the recognition of the difficulties associated with each person assigned a security badge being constantly vigilant in making sure that the user maintains possession of the badge. It is relatively easy to monitor that the badge is in the appropriate user's possession while the badge is being worn, i.e. the user is in the secured environment and the badge will typically be worn for display. This makes it easy for the user to periodically observe the badge. Since it is often a policy of entities associated with secured environments that the user should not display the badge outside of the secured environment, it becomes more difficult for the user to conveniently monitor the possession of the badge. Since users typically place badges in their coat pocket, purse, or pocket in a laptop carrying bag as they leave the secured environment, users may experience a false sense of security with regard maintaining possession of the badge.
- the present invention is especially, but not exclusively, suited for providing increased security with regard to maintaining possession of the badge outside of the secure environment.
- Another aspect of the present invention resides in the recognition that many users working in a secure environment often carry one or more electronic devices in their possession as they travel to and from the workplace. It is also during the time of traveling to and especially from the workplace that it is most likely an attempted theft of their badge will occur. A recognition of the coincidence of these factors contributed to the concept of the present invention.
- An RFID module or other device capable of responding to a wireless signal is attached to the badge.
- An electronic apparatus normally carried by the user while traveling to and from work such as a laptop computer, a cellular telephone or a personal digital assistant (PDA) is enabled to communicate with the electronic device attached to the badge.
- Electronic apparatus periodically polls the electronic device and monitors for a responding signal.
- the effective communication range between the electronic apparatus in the electronic device is intentionally limited to a predetermined distance, e.g. 20 feet.
- the electronic apparatus when outside of a proximate area will fail to receive a responding signal from the electronic device during the next poll and will initiate an appropriate action, e.g. providing an audible or visual alarm, or transmitting a predetermined security alert message.
- This periodic monitoring function can be disabled by the user such as while the user is at home or in the secure environment.
- FIG. 1 illustrates an exemplary system 10 with an identification badge 12 that includes an area 14 for a picture of the user to which the badge is issued.
- the badge may consist of a conventional identification badge made of plastic and may include known security features such as a hologram to protect against modification of the picture and barcode information.
- This badge includes in accordance with the embodiment of the present invention an electronic device or chip 16 such as an RFID chip mounted to the badge or otherwise integrated with the badge so that it cannot be removed from the badge without substantial disfigurement.
- the RFID chip transmits a unique identification code associated with the specific badge in response to receipt of an appropriate polling signal.
- the electronic device may automatically transmit a unique identification signal at continuously or at periodic intervals.
- a laptop computer 18 is typically carried by the user to and from the secured environment as well as the user's badge 12 .
- the laptop computer 18 includes an RFID communication link, i.e. the computer is adapted to generate a polling signal and to receive and decode a responding reply from the RFID chip 16 in badge 12 .
- a known RFID reader can be integrated as part of the computer or inserted as a plug in module to the electronic apparatus, e.g. a USB coupled device.
- the computer is configured to cause the generation of a periodic polling signal, i.e. every 30 seconds, to which the RFID module is responsive and to await a predetermined reply from the RFID chip 16 .
- the reply contains a unique identification for the module.
- the computer and/or the RFID reader contains a stored first identification to which the received identification from the module is compared. If the predetermined first identification is not received with the reply, the computer contains software that can be configured to initiate a variety of alerting actions.
- the computer may immediately generate a visual alert on the screen of the computer, generate an audible alarm sound, or both.
- the computer is programmed to take into account other factors in determining the type of alarm to be generated. For example, computer may generate only a visual alert on the screen of the computer if it is determined that the user is actively utilizing/accessing the computer. This would provide the user with an alert that would not be made known to the thief. If the user did not acknowledge the visual alert within a predetermined time or if the user was not determined to be accessing the computer, then additional alerts such as an audible alert and/or e-mail transmissions described below would be initiated.
- the computer can be programmed to transmit one or a plurality of e-mail messages addressed to the user, security personnel at the secured environment, police, etc. assuming that the computer currently has Internet or other communication connectivity such as by a WI-FI hot spot or broader coverage wireless communications capability.
- the e-mail may contain stored predetermined text containing information about the user, the user's computer, and/or the user's badge. If such an e-mail is sent to security personnel at the secured environment, guards can be alerted to monitor for attempts to enter the facility by a person utilizing the subject badge or the badge can be immediately invalidated at the facilities security database.
- the e-mail alert can be configured to only be sent if the user fails to make a predetermined manual entry on the computer within a predetermined time of the communication of a first visual/audible alert.
- the laptop computer 18 includes software that provides the user with flexibility with regard to the badge monitoring function.
- the user can manually activate and deactivate the monitoring function so that it is active only during appropriate times such as commuting to and from the secured environment.
- the software can configured to automatically engage the monitoring function during predetermined dates and time intervals during which the user is normally commuting to and from the secured environment.
- a computer enabled with global positioning satellite (GPS) or other location determining capabilities can be configured to automatically engage the badge monitoring function when it is sensed that the computer is moving from a predetermined location or is moving from the predetermined location in conjunction with a predetermined time interval.
- GPS global positioning satellite
- the badge monitoring function could be activated upon determining that the laptop computer is leaving the user's home during a time at which the user normally leaves for work at the secured environment.
- the badge monitoring function could also be activated upon determining that the laptop computer is leaving the user's secured work location.
- An electronic apparatus other than a laptop computer can be utilized to provide the monitoring functionality.
- a cellular telephone 20 can be configured with an RFID communication link and corresponding software to provide the badge monitoring functionality similarly to that described above for the laptop computer. Since most modem cellular telephones can display information on a screen as well as accepting various inputs from the user, the same or similar functions as described above with regard to laptop 18 can be implemented utilizing cellular telephone 20 .
- a PDA can also be utilized to provide the badge monitoring functionality.
- Area 22 represents the limited area in which communications utilizing the RFID link are effective. That has, the electronic apparatus providing the badge monitoring function and the badge was not be separated greater than a distance represented by area 22 in order to prevent the alarm(s) from being activated. It will be apparent to those skilled in the art that the exact distance associated with area 22 is not critical. However, this distance should not be made so small as to be inconvenient for the user. For example, if the distance were limited to 3 feet, then an undesired alarm might be triggered if the user placed his laptop computer in the backseat of a car while the badge was in the user's pocket in the front seat of the car. On the other hand, the distance should not be made so great as to render the alarm function ineffective.
- the effective communication distance was 1 mile
- a thief could steal the badge without being noticed by the user as the user left the secured environment and be able to utilize the stolen badge to attempt entry into the secured environment while the user (the user's laptop and/or savor telephone) was still within the 1 mile range.
- the periodic polling interval should be selected with care. This time intervals should be selected so as not to be so long as to give a thief too much time in which to act. On the other hand, a time interval should not be selected to be so short so as to cause unnecessary battery drain or computational load on the electronic apparatus carrying out the badge monitoring function.
- FIG. 2 shows a side view of the illustrative badge 12 with an attached RFID chip 16 .
- the chip could be embedded within the body of the badge if desired.
- FIG. 3 is a flow diagram of steps in accordance with an illustrative method in accordance with the present invention.
- step 30 the electronic apparatus polls the RFID module attached to the badge.
- a determination is made in step 32 by the electronic apparatus of whether a reply to the poll has been received from the badge.
- a YES determination results in the electronic apparatus waiting for a predetermined time as indicated in step 34 . Following this waiting period, process continues by returning to step 30 .
- these steps form a continuous loop of polls being sent by the electronic apparatus followed by appropriate replies transmitted from the badge being received by the electronic apparatus. This sequence is interpreted by the electronic apparatus as the badge being within the appropriate distance of the electronic apparatus during the badge monitoring function and hence there is no potential theft or loss issue for which an alarm is required.
- a NO determination by step 32 indicates that a reply was not received by the electronic apparatus from the badge response to a previously transmitted poll. This causes the electronic apparatus to determine the action to be taken in view of the lack of an appropriate reply in step 36 . As explained above, a variety of actions can be taken depending upon the desire of the user and of the level of security and communications desired by the secured environment. Of course, more than one action can be taken. In accordance with step 38 the programmed security action is initiated. The process terminates at END step 40 .
- an electronic device can be capable of generating periodic and/or continuous transmissions thereby requiring that the electronic apparatus only be capable of receiving the transmissions initiated from the electronic device.
- the embodiments of the present invention are applicable to other environments in which it is desired to monitor whether a person or object remains within a reasonable distance from another person, especially where the person desiring the monitoring function can move from place to place.
- a parent could desire to monitor whether a small child remains within the vicinity of the parent. This could be accomplished by appending a badge or object containing the electronic device to the child while the parent carries a device implementing the electronic apparatus function.
- an alarm is generated based on the separation of the electronic apparatus and the electronic device. That is, if a thief stolen the user's laptop and the user maintained his badge in the user's coat pocket, the laptop would implement the electronic apparatus function and cause an alarm to be generated (assuming of course that the laptop remains sufficiently operational and functioning to generate the alarm). Therefore, an implementation of the present invention can also serve a reverse role of providing protection in the form of an alarm in the case of the loss or theft of the electronic apparatus.
Abstract
Description
- This invention relates to protecting against loss or theft of portable items such as identification badges and is especially, but not exclusively, suited to immediately notify an owner if the portable item becomes separated by more than a short distance from another electronic device carried by the owner.
- Protecting the security of buildings and facilities is a high priority in some environments. This is especially true for critical and high security environments such as government offices, military facilities and restricted areas of an airport. An identification badge with a photograph of the authorized person typically forms part of the process for restricting access. A lost or stolen badge creates a security risk. If the security personnel checking badges does not personally know the person presenting an authentic badge, an impostor who has or is made up to have a similar appearance to the person pictured on the badge could be granted access.
- If an authorized user becomes aware that his badge has been lost or stolen, the authorized user can mitigate the security risk by informing appropriate security personnel who can then watch for a person presenting the badge or can invalidate the badge and issue the authorized user a new badge. However, a greater problem is presented when the authorized user is unaware that his badge has been stolen. For example, a thief seeking to steal a person's access badge might wait for an authorized user to enter an environment favorable to a pickpocket attempt such as a crowded train or bus. Then, the pickpocket or a team of pickpockets working together could distract the user and remove the badge from the user's coat pocket, purse or from a pocket of a laptop computer carry bag. Following an unnoticed theft of the badge, a security risk is posed until the authorized user becomes aware of the missing badge. If the theft of the badge occurs at the end of a workday, the authorized user may not become aware that the badge is gone until the following day. This provides the thief with an opportunity to seek access to the secured facility by using the stolen badge soon after the theft knowing that it is unlikely that the authorized user will become aware of the missing badge for some time. Therefore, there exists a need to provide increased security addressing the unnoticed theft of personal badges.
- It is an object of the present invention to satisfy this need.
- An exemplary electronic apparatus monitors whether a security badge remains within an area proximate to the electronic apparatus in order to protect against loss or theft of the badge especially when the user is away from the secure environment for which the badge facilitates access. A transmitter periodically transmits a poll signal intended for reception by a radio frequency identification (RFID) module attached to the badge, the poll signal having a predetermined magnitude to limit the effective reception range of the poll signal to the proximate area. A receiver can receive a reply signal generated by the RFID module in response to receipt of the poll signal where the reply signal includes identification information that is unique to the electronic device. The received identification information is compared with first identification information stored in memory of the electronic apparatus to determine if the received identification information matches the first identification information. An alert is transmitted if the identification information is not received that matches the first identification information.
- The present invention also contemplates an exemplary method that provides protection of a badge based on maintaining periodic wireless contact between the badge and an electronic apparatus where both the badge and electronic apparatus are carried by the user outside of the secured environment.
- Features of exemplary implementations of the invention will become apparent from the description, the claims, and the accompanying drawings in which:
-
FIG. 1 is a block diagram of an exemplary system in accordance with the present invention; -
FIG. 2 is a side view of the exemplary badge ofFIG. 1 ; -
FIG. 3 is a flow diagram of steps in an exemplary method in accordance with the present invention. - One aspect of the present invention resides in the recognition of the difficulties associated with each person assigned a security badge being constantly vigilant in making sure that the user maintains possession of the badge. It is relatively easy to monitor that the badge is in the appropriate user's possession while the badge is being worn, i.e. the user is in the secured environment and the badge will typically be worn for display. This makes it easy for the user to periodically observe the badge. Since it is often a policy of entities associated with secured environments that the user should not display the badge outside of the secured environment, it becomes more difficult for the user to conveniently monitor the possession of the badge. Since users typically place badges in their coat pocket, purse, or pocket in a laptop carrying bag as they leave the secured environment, users may experience a false sense of security with regard maintaining possession of the badge. The present invention is especially, but not exclusively, suited for providing increased security with regard to maintaining possession of the badge outside of the secure environment.
- Another aspect of the present invention resides in the recognition that many users working in a secure environment often carry one or more electronic devices in their possession as they travel to and from the workplace. It is also during the time of traveling to and especially from the workplace that it is most likely an attempted theft of their badge will occur. A recognition of the coincidence of these factors contributed to the concept of the present invention.
- A summary of the concept of the present invention will be helpful in understanding the detailed description of an embodiment of the invention which follows. An RFID module or other device capable of responding to a wireless signal is attached to the badge. An electronic apparatus normally carried by the user while traveling to and from work such as a laptop computer, a cellular telephone or a personal digital assistant (PDA) is enabled to communicate with the electronic device attached to the badge. Electronic apparatus periodically polls the electronic device and monitors for a responding signal. The effective communication range between the electronic apparatus in the electronic device is intentionally limited to a predetermined distance, e.g. 20 feet. If the badge with the electronic device which cannot be easily decoupled from the badge is stolen by a pickpocket from the user, the electronic apparatus when outside of a proximate area will fail to receive a responding signal from the electronic device during the next poll and will initiate an appropriate action, e.g. providing an audible or visual alarm, or transmitting a predetermined security alert message. This periodic monitoring function can be disabled by the user such as while the user is at home or in the secure environment.
-
FIG. 1 illustrates anexemplary system 10 with anidentification badge 12 that includes anarea 14 for a picture of the user to which the badge is issued. The badge may consist of a conventional identification badge made of plastic and may include known security features such as a hologram to protect against modification of the picture and barcode information. This badge includes in accordance with the embodiment of the present invention an electronic device orchip 16 such as an RFID chip mounted to the badge or otherwise integrated with the badge so that it cannot be removed from the badge without substantial disfigurement. The RFID chip transmits a unique identification code associated with the specific badge in response to receipt of an appropriate polling signal. Alternatively, the electronic device may automatically transmit a unique identification signal at continuously or at periodic intervals. - A
laptop computer 18 is typically carried by the user to and from the secured environment as well as the user'sbadge 12. Thelaptop computer 18 includes an RFID communication link, i.e. the computer is adapted to generate a polling signal and to receive and decode a responding reply from theRFID chip 16 inbadge 12. A known RFID reader can be integrated as part of the computer or inserted as a plug in module to the electronic apparatus, e.g. a USB coupled device. The computer is configured to cause the generation of a periodic polling signal, i.e. every 30 seconds, to which the RFID module is responsive and to await a predetermined reply from theRFID chip 16. The reply contains a unique identification for the module. The computer and/or the RFID reader contains a stored first identification to which the received identification from the module is compared. If the predetermined first identification is not received with the reply, the computer contains software that can be configured to initiate a variety of alerting actions. The computer may immediately generate a visual alert on the screen of the computer, generate an audible alarm sound, or both. Preferably the computer is programmed to take into account other factors in determining the type of alarm to be generated. For example, computer may generate only a visual alert on the screen of the computer if it is determined that the user is actively utilizing/accessing the computer. This would provide the user with an alert that would not be made known to the thief. If the user did not acknowledge the visual alert within a predetermined time or if the user was not determined to be accessing the computer, then additional alerts such as an audible alert and/or e-mail transmissions described below would be initiated. - The computer can be programmed to transmit one or a plurality of e-mail messages addressed to the user, security personnel at the secured environment, police, etc. assuming that the computer currently has Internet or other communication connectivity such as by a WI-FI hot spot or broader coverage wireless communications capability. The e-mail may contain stored predetermined text containing information about the user, the user's computer, and/or the user's badge. If such an e-mail is sent to security personnel at the secured environment, guards can be alerted to monitor for attempts to enter the facility by a person utilizing the subject badge or the badge can be immediately invalidated at the facilities security database. The e-mail alert can be configured to only be sent if the user fails to make a predetermined manual entry on the computer within a predetermined time of the communication of a first visual/audible alert.
- In a preferred embodiment the
laptop computer 18 includes software that provides the user with flexibility with regard to the badge monitoring function. For example, the user can manually activate and deactivate the monitoring function so that it is active only during appropriate times such as commuting to and from the secured environment. Alternatively, the software can configured to automatically engage the monitoring function during predetermined dates and time intervals during which the user is normally commuting to and from the secured environment. A computer enabled with global positioning satellite (GPS) or other location determining capabilities can be configured to automatically engage the badge monitoring function when it is sensed that the computer is moving from a predetermined location or is moving from the predetermined location in conjunction with a predetermined time interval. For example, the badge monitoring function could be activated upon determining that the laptop computer is leaving the user's home during a time at which the user normally leaves for work at the secured environment. The badge monitoring function could also be activated upon determining that the laptop computer is leaving the user's secured work location. - An electronic apparatus other than a laptop computer can be utilized to provide the monitoring functionality. For example, a
cellular telephone 20 can be configured with an RFID communication link and corresponding software to provide the badge monitoring functionality similarly to that described above for the laptop computer. Since most modem cellular telephones can display information on a screen as well as accepting various inputs from the user, the same or similar functions as described above with regard tolaptop 18 can be implemented utilizingcellular telephone 20. Likewise, a PDA can also be utilized to provide the badge monitoring functionality. -
Area 22 represents the limited area in which communications utilizing the RFID link are effective. That has, the electronic apparatus providing the badge monitoring function and the badge was not be separated greater than a distance represented byarea 22 in order to prevent the alarm(s) from being activated. It will be apparent to those skilled in the art that the exact distance associated witharea 22 is not critical. However, this distance should not be made so small as to be inconvenient for the user. For example, if the distance were limited to 3 feet, then an undesired alarm might be triggered if the user placed his laptop computer in the backseat of a car while the badge was in the user's pocket in the front seat of the car. On the other hand, the distance should not be made so great as to render the alarm function ineffective. For example, if the effective communication distance was 1 mile, then it is conceivable that a thief could steal the badge without being noticed by the user as the user left the secured environment and be able to utilize the stolen badge to attempt entry into the secured environment while the user (the user's laptop and/or savor telephone) was still within the 1 mile range. - Similarly, the periodic polling interval should be selected with care. This time intervals should be selected so as not to be so long as to give a thief too much time in which to act. On the other hand, a time interval should not be selected to be so short so as to cause unnecessary battery drain or computational load on the electronic apparatus carrying out the badge monitoring function.
-
FIG. 2 shows a side view of theillustrative badge 12 with an attachedRFID chip 16. Of course, the chip could be embedded within the body of the badge if desired. -
FIG. 3 is a flow diagram of steps in accordance with an illustrative method in accordance with the present invention. Instep 30 the electronic apparatus polls the RFID module attached to the badge. A determination is made instep 32 by the electronic apparatus of whether a reply to the poll has been received from the badge. A YES determination results in the electronic apparatus waiting for a predetermined time as indicated instep 34. Following this waiting period, process continues by returning to step 30. Thus, these steps form a continuous loop of polls being sent by the electronic apparatus followed by appropriate replies transmitted from the badge being received by the electronic apparatus. This sequence is interpreted by the electronic apparatus as the badge being within the appropriate distance of the electronic apparatus during the badge monitoring function and hence there is no potential theft or loss issue for which an alarm is required. - A NO determination by
step 32 indicates that a reply was not received by the electronic apparatus from the badge response to a previously transmitted poll. This causes the electronic apparatus to determine the action to be taken in view of the lack of an appropriate reply instep 36. As explained above, a variety of actions can be taken depending upon the desire of the user and of the level of security and communications desired by the secured environment. Of course, more than one action can be taken. In accordance withstep 38 the programmed security action is initiated. The process terminates atEND step 40. - Although exemplary implementations of the invention have been depicted and described in detail herein, it will be apparent to those skilled in the art that various modifications, additions, substitutions, and the like can be made without departing from the spirit of the invention. For example, in order to eliminate a potentially false alert due to a momentary loss of the communication link between the electronic apparatus and the badge, more than one failed reply can be required in order to trigger an alert. Instead of the electronic apparatus providing periodic polling of the electronic device, an electronic device can be capable of generating periodic and/or continuous transmissions thereby requiring that the electronic apparatus only be capable of receiving the transmissions initiated from the electronic device. It will be apparent to those skilled in the art that the embodiments of the present invention are applicable to other environments in which it is desired to monitor whether a person or object remains within a reasonable distance from another person, especially where the person desiring the monitoring function can move from place to place. For example, a parent could desire to monitor whether a small child remains within the vicinity of the parent. This could be accomplished by appending a badge or object containing the electronic device to the child while the parent carries a device implementing the electronic apparatus function.
- In the basic implementation an alarm is generated based on the separation of the electronic apparatus and the electronic device. That is, if a thief stole the user's laptop and the user maintained his badge in the user's coat pocket, the laptop would implement the electronic apparatus function and cause an alarm to be generated (assuming of course that the laptop remains sufficiently operational and functioning to generate the alarm). Therefore, an implementation of the present invention can also serve a reverse role of providing protection in the form of an alarm in the case of the loss or theft of the electronic apparatus.
- The scope of the invention is defined in the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/141,436 US7271718B2 (en) | 2005-05-31 | 2005-05-31 | Protection against loss or theft of identification badges and other items |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/141,436 US7271718B2 (en) | 2005-05-31 | 2005-05-31 | Protection against loss or theft of identification badges and other items |
Publications (2)
Publication Number | Publication Date |
---|---|
US20060267762A1 true US20060267762A1 (en) | 2006-11-30 |
US7271718B2 US7271718B2 (en) | 2007-09-18 |
Family
ID=37462646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/141,436 Active 2025-11-10 US7271718B2 (en) | 2005-05-31 | 2005-05-31 | Protection against loss or theft of identification badges and other items |
Country Status (1)
Country | Link |
---|---|
US (1) | US7271718B2 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060055538A1 (en) * | 2004-08-26 | 2006-03-16 | Swisscom Mobile Ag | Method and system for finding lost or stolen objects |
US20070241902A1 (en) * | 2006-04-18 | 2007-10-18 | Princeton Technology Corporation | Radio frequency identification (RFID) systems and methods |
FR2935519A1 (en) * | 2008-09-04 | 2010-03-05 | Gerard Joseph Michel Pareti | DEVICE FOR NOT LOSING A KEY KIT |
US20100155492A1 (en) * | 2008-12-18 | 2010-06-24 | Forster Ian J | Badge with rfid device |
US8061607B1 (en) * | 2005-02-24 | 2011-11-22 | Onasset Intelligence, Inc. | Method and system of universal RFID communication |
US20150154847A1 (en) * | 2013-11-29 | 2015-06-04 | Ian Oliver | Conditional Separation Alert System |
US20160049069A1 (en) * | 2014-08-14 | 2016-02-18 | Paulo BR Oliveira | Anti-Theft Wireless Protection System |
WO2016165869A3 (en) * | 2015-04-15 | 2016-12-08 | Robert Bosch Gmbh | Monitoring system and method for operating same |
WO2018083393A1 (en) * | 2016-11-04 | 2018-05-11 | Ico | System for protection from loss or theft of a physical card |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NZ555918A (en) * | 2007-06-15 | 2008-07-31 | L & D Technology Ltd | Orientation system and method |
US20090079567A1 (en) * | 2007-09-20 | 2009-03-26 | Chirag Vithalbhai Patel | Securing an article of value |
US20110023130A1 (en) * | 2007-11-26 | 2011-01-27 | Judson Mannon Gudgel | Smart Battery System and Methods of Use |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6842121B1 (en) * | 1996-04-04 | 2005-01-11 | Micron Technology, Inc. | RF identification system for determining whether object has reached destination |
US7005985B1 (en) * | 1999-07-20 | 2006-02-28 | Axcess, Inc. | Radio frequency identification system and method |
US7015817B2 (en) * | 2002-05-14 | 2006-03-21 | Shuan Michael Copley | Personal tracking device |
US7116230B2 (en) * | 2004-07-14 | 2006-10-03 | Verichip Corporation | Asset location system |
-
2005
- 2005-05-31 US US11/141,436 patent/US7271718B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6842121B1 (en) * | 1996-04-04 | 2005-01-11 | Micron Technology, Inc. | RF identification system for determining whether object has reached destination |
US7005985B1 (en) * | 1999-07-20 | 2006-02-28 | Axcess, Inc. | Radio frequency identification system and method |
US7015817B2 (en) * | 2002-05-14 | 2006-03-21 | Shuan Michael Copley | Personal tracking device |
US7116230B2 (en) * | 2004-07-14 | 2006-10-03 | Verichip Corporation | Asset location system |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7420465B2 (en) * | 2004-08-26 | 2008-09-02 | Swisscom Mobile Ag | Method and system for finding lost or stolen objects |
US20060055538A1 (en) * | 2004-08-26 | 2006-03-16 | Swisscom Mobile Ag | Method and system for finding lost or stolen objects |
US8061607B1 (en) * | 2005-02-24 | 2011-11-22 | Onasset Intelligence, Inc. | Method and system of universal RFID communication |
US20070241902A1 (en) * | 2006-04-18 | 2007-10-18 | Princeton Technology Corporation | Radio frequency identification (RFID) systems and methods |
US8237702B2 (en) * | 2006-04-18 | 2012-08-07 | Princeton Technology Corporation | Radio frequency identification (RFID) systems and methods |
FR2935519A1 (en) * | 2008-09-04 | 2010-03-05 | Gerard Joseph Michel Pareti | DEVICE FOR NOT LOSING A KEY KIT |
WO2010026311A3 (en) * | 2008-09-04 | 2010-04-29 | Pareti Gerald | Device for preventing the loss of keys |
US20100155492A1 (en) * | 2008-12-18 | 2010-06-24 | Forster Ian J | Badge with rfid device |
US8534562B2 (en) | 2008-12-18 | 2013-09-17 | Avery Dennison Corporation | Badge with RFID device |
US20150154847A1 (en) * | 2013-11-29 | 2015-06-04 | Ian Oliver | Conditional Separation Alert System |
US9854385B2 (en) * | 2013-11-29 | 2017-12-26 | Ian James Oliver | Conditional separation alert system |
US20160049069A1 (en) * | 2014-08-14 | 2016-02-18 | Paulo BR Oliveira | Anti-Theft Wireless Protection System |
WO2016165869A3 (en) * | 2015-04-15 | 2016-12-08 | Robert Bosch Gmbh | Monitoring system and method for operating same |
WO2018083393A1 (en) * | 2016-11-04 | 2018-05-11 | Ico | System for protection from loss or theft of a physical card |
FR3058551A1 (en) * | 2016-11-04 | 2018-05-11 | Ico | CASE CONNECTED FOR CARD |
Also Published As
Publication number | Publication date |
---|---|
US7271718B2 (en) | 2007-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7271718B2 (en) | Protection against loss or theft of identification badges and other items | |
US7710268B2 (en) | System and method to protect personal property | |
US9311586B2 (en) | Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology | |
US8902066B2 (en) | Alert for real-time risk of theft or loss | |
US9519808B2 (en) | Method and apparatus for protecting data in a portable electronic device | |
US6362736B1 (en) | Method and apparatus for automatic recovery of a stolen object | |
US7142096B2 (en) | Combination car alarm and personal locator system | |
EP1537549B1 (en) | Device, system, and method for position reporting or tracking | |
US7398153B2 (en) | Portable motion-activated position reporting device | |
US20150334524A1 (en) | Wireless tracking device | |
US20060232398A1 (en) | System for personal possessions security | |
US20040178907A1 (en) | Alarm system for a portable device | |
US9142109B2 (en) | Panic device with local alarm and distal signaling capability | |
US20010048364A1 (en) | Remote-to-remote position locating system | |
US8519845B2 (en) | System and method for tracking people | |
US7791469B2 (en) | Short range wireless tracking and event notification system for portable devices | |
US7872578B2 (en) | Tracking, identification, and security system for a portable device | |
US20100315235A1 (en) | GPS Security Network and Tracking System | |
US20080158002A1 (en) | Portable object tracking system and security tracking bag or money pack for use therewith | |
US20040032325A1 (en) | Bluetooth theft control | |
CN105929429A (en) | Tracker for preventing loss of objects | |
US9830443B2 (en) | Device and method for controlling access to at least one machine | |
JP2007018397A (en) | Article management apparatus, article management system and article managing method | |
EP1915746B1 (en) | System as well as method for protecting an item to be secured | |
WO2012078076A2 (en) | Alarm signaling method based on monitoring the proximity of transmitting and receiving radio devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JEDLICKA, TIMOTHY E.;WILKIN, GEORGE P.;REEL/FRAME:016647/0370;SIGNING DATES FROM 20050525 TO 20050526 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001 Effective date: 20170912 Owner name: NOKIA USA INC., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001 Effective date: 20170913 Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001 Effective date: 20170913 |
|
AS | Assignment |
Owner name: NOKIA US HOLDINGS INC., NEW JERSEY Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682 Effective date: 20181220 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001 Effective date: 20211129 |
|
AS | Assignment |
Owner name: BARINGS FINANCE LLC, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RPX CORPORATION;REEL/FRAME:063429/0001 Effective date: 20220107 |